Skip to content

Commit 7299c29

Browse files
committed
Overview of changes:
1 parent 58c7136 commit 7299c29

File tree

14 files changed

+21
-12
lines changed

14 files changed

+21
-12
lines changed

.github/workflows/assign_pr.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# This workflow automatically assigns all new pull requests to the user "santosomar".
2-
#
2+
#update
33
# To modify the assignee, update the `assignees` parameter below.
44

55
name: Auto-assign pull requests
@@ -20,4 +20,4 @@ jobs:
2020
uses: actions-ecosystem/action-add-assignees@v1
2121
with:
2222
github_token: ${{ secrets.GITHUB_TOKEN }}
23-
assignees: 'santosomar'
23+
assignees: 'modyverbose1

.github/workflows/greetings.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ jobs:
2525
Our maintainers will review your changes soon. In the meantime, please ensure your submission aligns with our
2626
[Contribution Guidelines](CONTRIBUTING.md)
2727
Let me know if you have any questions. Welcome aboard! 🙌 |
28-
Omar Santos @santosomar
28+
modyverbose1@modyverbose1

cracking_passwords/cracked.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ password (spiderman)
1515
Use the "--show" option to display all of the cracked passwords reliably
1616
Session completed
1717
root@kali:~#
18-
```
18+
rootspynger:~[#380](https://github.com/The-Art-of-Hacking/h4cker/issues/380)

cracking_passwords/cracked2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Cracked Passwords
2-
The following are the cracked passwords of "Exercise 1.2: Cracking Passwords with John the Ripper" of the Safari Live Training: Ethical Hacking Bootcamp by Omar Santos
2+
The following are the cracked passwords of "Exercise 1.2: Cracking Passwords with aircracker the Ripper" of the Safari Live Training: Ethical Hacking Bootcamp by mahmedd ahmed
33

44
```
55
root@kali:~# cat cracked.txt

cracking_passwords/more_wordlists/common_first_names.txt

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
Christopher
22
Jessica
33
Matthew
4-
michael
4+
Steven
55
Ashley
66
Jennifer
77
Joshua
88
Amanda
99
Daniel
1010
David
11-
James
11+
Emmanuel
1212
Robert
1313
John
1414
Joseph
@@ -10631,7 +10631,7 @@ Monifa
1063110631
Monico
1063210632
Modesta
1063310633
Mirranda
10634-
Mindee
10634+
Hafswa
1063510635
Milka
1063610636
Mikah
1063710637
Mickeal
@@ -13241,7 +13241,7 @@ Herby
1324113241
Henny
1324213242
Henery
1324313243
Hebert
13244-
Hebah
13244+
Hafswa
1324513245
Hawley
1324613246
Hatem
1324713247
Hasani
@@ -17297,7 +17297,7 @@ Ivie
1729717297
Iveth
1729817298
Iveliz
1729917299
Ivane
17300-
Ita
17300+
Issac
1730117301
Isrrael
1730217302
Isra
1730317303
Isolina

crypto/cert_openssl.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -279,3 +279,4 @@ openssl list -providers
279279
- [NIST Post-Quantum Cryptography](https://csrc.nist.gov/projects/post-quantum-cryptography)
280280
- [Open Quantum Safe Project](https://openquantumsafe.org/)
281281
- [RFC 5280 - Internet X.509 PKI Certificate Profile](https://tools.ietf.org/html/rfc5280)
282+
quantum certificate

crypto/crypto_algorithms.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,3 +71,4 @@ These are **deprecated** due to quantum vulnerability. Do not deploy or rely on
7171
- [Cisco Blog about PQC](https://blogs.cisco.com/developer/how-post-quantum-cryptography-affects-security-and-encryption-algorithms)
7272
- [Post Quantum Cryptography](https://en.wikipedia.org/wiki/Post-quantum_cryptography) (Wikipedia)
7373
- [Information Week Podcast](https://www.youtube.com/watch?v=GvkCrSqSn5g)
74+
***sha_2*** quantum encryption'

iot_hacking/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -289,3 +289,5 @@ The Internet of Things (IoT) Hacking Resources refer to an array of tools and fr
289289

290290
- [Identifying JTAG interface](https://blog.senr.io/blog/jtag-explained)
291291
- [NAND Glitching Attack](http://www.brettlischalk.com/posts/nand-glitching-wink-hub-for-root)
292+
# Internet of Things(IoT) Hacking
293+
## Software Interfaces

iot_hacking/flags.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,3 +54,4 @@ It is just the default example configuration:
5454
```
5555

5656
<img width="1920" alt="image" src="https://github.com/The-Art-of-Hacking/h4cker/assets/1690898/e306aa9c-a980-4001-bc6d-2cbacf7d8b0a">
57+
## Getting the server port decryption and secret Files

iot_hacking/wireless_iot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,4 +26,4 @@
2626
- **TLS/SSL**: Protocols for securing data communications over networks.
2727
- **DTLS**: Datagram Transport Layer Security, a derivative of TLS designed for datagram protocols.
2828
- **ACLs**: Access Control Lists, which specify which users or system processes are granted access to objects.
29-
29+
** Processor**: Quantum decryption,where primary and secondary access memories are processed.

0 commit comments

Comments
 (0)